Sciweavers

179 search results - page 12 / 36
» Foundations for Transparency Requirements Engineering
Sort
View
ESORICS
2004
Springer
14 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
SIGSOFT
2008
ACM
14 years 10 months ago
Asynchronous exception propagation in blocked tasks
Asynchronous exception propagation is a useful alternative form of communication among threads, especially if timely propagation is ensured. However, timely propagation is impossi...
Roy Krischer, Peter A. Buhr
WCRE
2005
IEEE
14 years 3 months ago
Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages
— Chuck is a new code browser that allows navigation of a code base along semantic structures, such as data-flow and higher-order control-flow relationships. Employing the fast...
S. Alexander Spoon, Olin Shivers
EUROMICRO
2004
IEEE
14 years 1 months ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng
DAGSTUHL
2006
13 years 11 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens